Você está na página 1de 15

Auditing

Cyber Security:
Evaluating Risk and Auditing Controls

ABSTRACT
Cyber security has become a prevalent issue today facing most organizations, one that is recognized
by companies to be an enterprisewide issue requiring thoughtful attention. Investments in controls are
necessary to protect organizations from increasingly sophisticated and widely available attack methods.
Intentional attacks, breaches and incidents can have damaging consequences. This white paper highlights
the need for these controls implemented as part of an overall framework and strategy, and focuses on the
subsequent assurance that is needed through management review, risk assessments and audits of the
cyber security controls.
Auditing Cyber Security: Evaluating Risk and Auditing Controls 2

INTRODUCTION This white paper will provide some guidance on evaluating


the risk and auditing the cyber security controls for an
Cyber security is receiving increased attention from the boards organization. These concepts apply to organizations large and
of many organizations today in large part due to the bad small, even though the investment dollars and approaches will
publicity generated from recent large data breaches. Senior be focused differently and of a different scale.
members of management and corporate boards have lost
their positions, and organizations have had to spend valuable
resources in post-breach cleanup and to make their clients and
customers whole. Infrastructure spending has increased as
CYBER SECURITY
organizations attempt to prevent the breaches from occurring,
and security technology investments in incident detection and
CONTROL SPECIFICATION
Each organization should design controls specific to the risk
response mechanisms are climbing to limit the damage and
posture of the organization and ensure that processes and
liability should the event occur.
people are in place to continuously manage the controls.
These activities to enhance the infrastructure and Control issues typically are not due to the failure of the
defense mechanisms are welcomed investments to technology, but more often are the result of individuals not
those charged with protecting from and responding executing the process or using a process that is poorly
to the attacks, but they represent only one necessary defined. Administrative, technical and operational controls
component of any cyber security program. The fundamental can be sourced from many places, such as COBIT 5 for
questions that need to be asked are those such as: Information Security1 as a baseline.

Where is the best place to invest the next security dollar? One of the primary goals of any cyber security program
should be to limit the attractiveness for the attacker.
Is the right amount being invested?
Hacking has moved well beyond the script kiddie
Are there areas of risk that are not being addressed? threat stage, and the more time it takes an attacker
to penetrate a system, the less desirable that target
Is the current infrastructure sufficient?
becomes. If an attacker wants to break into a car at a
Are the dollars invested that we have today being used shopping mall during the holidays, it would be easier to jiggle
wisely? all the car door handles to find the one whose owner did not
How are competitors approaching this and what are they lock it vs. breaking into the first car the attacker sees with a
spending on information asset protection? crowbar, potentially setting off the alarms. Control investments
are made across the organization through technical,
The answers to these questions are best answered by: administrative and operational investments in people, process,
1) evaluating the current and emerging risk to the organization, technology and growing a security-oriented culture. These
and 2) auditing the security controls that are current or investments may include:
planned to be in place to protect the information assets.
Awareness investment
Without executing formal processes to determine the risk,
identify controls to mitigate the risk and subsequently audit the Policy investment
controls, company assurance that information assets are being
Intrusion detection systems
adequately protected would be subject to chance. Without
formal processes, there is the risk that inappropriate tools Event logging
would be purchased without understanding where the tool fits Incident response
into the architecture. Did this tool replace another tool? Will this
tool improve the cyber security capabilities sufficiently beyond Vulnerability scanning
the current tool set to warrant the additional cost? Based upon Information asset classification
the risk that the organization currently has, could the money
have been spent better somewhere else? Are the current tools Forward intelligence
implemented and being attended to, or were they purchased Architecture and technology hardening
and are now shelfware?
Systems hardening

1 ISACA, COBIT 5 for Information Security, USA, 2012, www.isaca.org/COBIT/Pages/info-sec.aspx

2017 ISACA. All rights reserved.


Auditing Cyber Security: Evaluating Risk and Auditing Controls 3

The attractiveness decreases as investments are made in 800-53 is to provide guidelines for selecting and specifying
cyber security controls in the preceding list (see figure 1). security controls for information systems supporting executive
agencies of the federal government. The NIST model, in
Leveraging Different Cyber Security contrast to the COBIT 5 model, is very prescriptive in nature
Control Frameworks and may be overwhelming to many organizations. SP
There are many approaches available for specifying cyber 800-53 contains very detailed definitions and may be best
security control environments, such as National Institute of used to complement and help develop the organization-
Standards and Technology (NIST) Special Publication (SP) specific detailed activities to perform the COBIT 5 practices,
800-53 Revision 4, Security and Privacy Controls for Federal which, in turn, as indicated in the previous section, support
Information Systems and Organizations.2 The purpose of SP the overarching cyber security process.

FIGURE 1TARGETED CYBER SECURITY INVESTMENTS

Systems
hardening
Architecture Forward
and technology intelligence
Time and Information
resources Motive and asset
Exploit Technical opportunity classification
availability level

Target
attractiveness
Awareness Attack
investment External probability
attacks

TOTAL CHANGE IN Decreased


ATTACKS ATTRACTIVENESS attractiveness
Internal Internal
associates attacks
Increased
attractiveness
Policy Attacks
investment detected

IDS Vulnerabilities
event logging, identified
incident
response
Scanning,
monitoring

SOURCE: ISACA, Transforming Cybersecurity, USA, 2013, figure 58

2 National Institute of Standards and Technology (NIST), NIST SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, USA, 2015, http://nvlpubs.nist.gov/
nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf

2017 ISACA. All rights reserved.


Auditing Cyber Security: Evaluating Risk and Auditing Controls 4

The Center for Internet Security (CIS) promotes critical controls by thoughtful identification and implementation of the
to provide a prioritized set of cyber security practices to reduce aforementioned frameworks. For example, they may have
the risk of cyberattacks.3 These are technical-based controls implemented a firewall, antivirus software, limited user
such as ensuring that accurate inventories of authorized and education about password construction and backups. Each
unauthorized devices are available, secure configurations of these controls serves a purpose to protect information
are created, vulnerabilities are assessed and remediated, assets. However, the same low-maturity organization may
and administrative privileges are controlledprioritized with not have placed adequate attention in ensuring that the
increased level of control importance. The idea is that by firewall rules are updated regularly, antivirus software may not
mitigating these cyber security gaps, the bar is raised for the be installed on all workstations or contain the latest signatures,
external hacker to gain access. The controls are important, and or end users who are on leave may miss the security awareness
this process differs from the COBIT 5 approach as there is less training. Therefore, even though controls may appear to be in
focus on development of processes to support the business place, the organization must regularly engage in independent
objectives, and the primary focus is on the technical controls audits to ensure these processes are well designed and
that need to be implemented. These controls, as with the executed properly.
NIST SP 800-53 controls, are useful in building the detailed
activities to support the processes and practices needed, Control Shelf Life
but the COBIT 5 process enablers are necessary to ensure Controls are implemented to address the threat
the right cyber security activities are performed efficiently and environment and the operating infrastructure known
effectively. These constructs are not readily apparent by using at the time. As threat environments change, such
solely the CIS Critical Controls. as the shift to cloud, mobile, Internet of Things (IoT),
big data, security analytics and the need for new
International Organization for Standardization (ISO)/International
classes of controls to address the new location of the
Electrotechnical Commission (IEC) 27001, Information
information, so must the controls change. The audits
technologySecurity techniquesInformation security
on these controls will also change, as new areas must now
management systemsRequirements4 and the Information
be audited (i.e., auditing the backup strategy for a cloud
Security Forum Standard of Good Practice for Information
application or the password controls on a mobile device)
Security5 can be used to supplement the processes of the five
to address controls that were not necessary in the past.
domains of the COBIT 5 for Information Security framework.
Deficiencies once accepted in prior audits may no longer be
The relevant guidance in these standards, along with the
accepted due to new laws and regulations or the growth in the
NIST SP 800-53 controls, has been mapped to the COBIT 5
amount of data and subsequent increased risk to
framework in the COBIT 5 for Information Security appendices.
the organization.
Using the COBIT 5 framework and the associated processes
provides the overarching governance and management
assurance that adequate cyber security coverage exists, from
the governance and planning of cyber security activities to the MULTIPLE LINES OF
ongoing operation and measurement of the program.
DEFENSE AND REVIEW
Implementing Controls
Even organizations that are low on the maturity scale have PROCESSES
often implemented controls that are necessary as a first line The audit and review universe is spread across
of defense, but may not have planned the implementation three lines of defense, each of which contributes to
the overall assurance of the cyber security program.

3 Center for Internet Security (CIS), CIS Controls Library Resources, www.cisecurity.org/critical-controls/Library.cfm
4 International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27001, Information technologySecurity techniquesInformation security management systems
Requirements, 2013, https://webstore.ansi.org/RecordDetail.aspx?sku=ISO%2fIEC+27001%3a2013&source=msn&adgroup=27001&keyword=iso%20iec%2027001&utm_source=bing&utm_
medium=cpc&utm_campaign=Campaign%20%231&utm_term=iso%20iec%2027001&utm_content=27001
5 The Information Security Forum (ISF) Standard of Good Practice for Information Security, 2016, www.securityforum.org/tool/the-isf-standardrmation-security/

2017 ISACA. All rights reserved.


Auditing Cyber Security: Evaluating Risk and Auditing Controls 5

These lines of defense are management, risk management these processes is part of business processes designed to
and internal audit (see figure 2). Reasonable independence identify control weaknesses or deficiencies in either the design
is achieved, as the controls that were discussed in the or the ongoing execution of the control.
preceding section, such as ensuring firewall rules are set,
may be reviewed as part of a control assessment (first line With the prevalence of cloud services and increasing
management), risk assessment of a high-value asset (second movement of data beyond company perimeters, many
linerisk management) or through a third-line control by an organizations are now issuing questionnaires to their third-party
internal audit. Having these audits and reviews performed by vendors to gain some comfort regarding the protection of their
independent functions increases the likelihood of detecting information assets. These questionnaires can become very
control weaknesses and provides further checks and balances. voluminous and represent an additional burden on small firms
not equipped to answer the questions. Request for proposal
(RFP) processes for vendors are also requesting reports
Management Review
indicating their compliance to ISO/IEC 27001, Statements on
As the first line of defense for the enterprise, management
Standards for Attestation Engagements (SSAE) 16 Service
across the organization is assumed to have a vested interest in
Organization Control (SOC) 2 type reports,6 and third-party
ensuring that cyber security controls are present and operating
standardized vendor security scorecards. It behooves an
effectively. Responsibility and accountability are typically
organization to create a master database of questions and
delegated from senior management to carry out various testing
answers to enable accurate and timely response to these
activities, such as control self-assessments (CSAs), attack and
requests. Business opportunities may be lost without being
breach penetration testing, functional and technical testing,
able to demonstrate compliance with basic security controls.
social/behavioral testing, and management reviews. Each of

FIGURE 2LINES OF DEFENSE AND TYPICAL REVIEW ACTIVITY

Internal controls testing


Cyber security compliance
Third LineInternal Audit
Formal risk acceptances
Investigation/forensics

Threats, vulnerabilities, risk


Formal risk evaluation
Second LineRisk Management
Business impact analysis (BIA)
Emerging risk

Control self-assessments (CSAs)


Attack/break penetration testing
First LineManagement
Functional/technical testing
Social/behavioral testing
Regular management review

SOURCE: ISACA, Transforming Cybersecurity, USA, 2013, figure 45

6 American Institute of Certified Public Accountants, Statements on Standards for Attestation Engagements, 2016, www.aicpa.org/Research/Standards/AuditAttest/Pages/SSAE.aspx

2017 ISACA. All rights reserved.


Auditing Cyber Security: Evaluating Risk and Auditing Controls 6

Management review is not a check-the-box or hold-an-annual- whether this is a low, moderate or high system with respect
meeting activity, as this is intended to identify where control to CIA requirements will help frame the system for the risk
gaps are so that they can be mitigated. The attackers are assessment. Failure to accurately scope the system can result
leveraging some of the same tools, such as penetration in critical assets being excluded from the security protections.
testers and vulnerability scanning/exploit tools, to test
the network. Identify Threats
Threats are those dangers that have the potential to impact
Cyber Security Risk Assessment CIA if adequate controls are not in place to thwart the damage.
Management ultimately owns the risk decisions made for These may span from human threats (e.g., carelessness,
the organizationdecisions that are based on guidance human error, espionage, sensitive data disclosure, social
the security officer and enterprise management provide, media exploits, sabotage, fraud), to environmental threats
through the risk management processes, on the appropriate (e.g., power/heating, ventilating, air conditioning [HVAC]
direction to take. The risk is present in the operational areas fluctuation, cable cuts, theft, sensitive media disposal, server
of the company and controls implemented must support rooms, broken water pipes, fire), to technical threats (e.g.,
the protection of assets. The business manager needs to lack of logging, malicious code, unauthorized access, session
be guided as to how to determine the level of confidentiality, takeover, mobile media loss, hardware/software failure, remote
integrity and availability (CIA) controls necessary for the access). Has the organization identified the threats that are
department to sustain its business operations. specific to itself? For example, if the data center is near a train
track over which hazardous materials are transported, has this
Companies may leverage a qualitative risk assessment process
been accounted for? Or is the organization involved in activities
that can provide an adequate measure of risk at a lower cost
that might attract hacktivism interest? Each organization
than a detailed, quantitative method. Quantitative methods can
needs to evaluate the threats based upon the industry in
provide the appearance of providing precise measurements
which it operates and the motives of the attacker.
or dollar amounts related to the risk, but these calculations
are often based on subjective probability measures that are
not so precise. Management can more readily understand Vulnerability Identification
and interpret high/medium/low or red/yellow/green charts Vulnerabilities are extremely critical to the risk evaluation
than detailed mathematical formulas. For this reason, many process. Specifically, vulnerabilities provide the opportunity for
organizations use a qualitative approach. The objective in any an exploit to occur; logically, therefore and by definition, without
risk assessment is to communicate the state of the risk such a vulnerability present there is no risk, while with a vulnerability
that the easier the risk assessment is to understand, the more the risk can be potentially tremendous. Many of these
valuable it is. vulnerabilities in system software, procedures and internal
controls are the result of a control not being applied. Someone
Risk assessment approaches typically involve examining the may have desire to walk into an art museum and take a
environment through the following constructs. valuable painting off the wall; however, one would suspect that
the ability to walk out the front door with a valuable art piece
Scope the System would face a series of alarms and security guards stopping
The system boundaries and requirements for CIA need to be the theft. These are vulnerabilities that have been mitigated by
known. The system and data included in the risk assessment appropriate controls. So, the question is, has the organization
should have a documented business purpose, technical reviewed where the vulnerabilities are to honestly evaluate the
specification and controls identified that are currently operating risk? Are these vulnerabilities carried over from year to year
within the system. Understanding these requirements and without review and just accepted?

2017 ISACA. All rights reserved.


Auditing Cyber Security: Evaluating Risk and Auditing Controls 7

Existing Control Identification Determine Risk Level


An attacker is less likely to succeed, even with motive (threat), Risk is typically determined by examining the likelihood
and opportunity (vulnerability), if the vulnerability is mitigated of occurrence and the impact, resulting in a risk level by
through an existing primary or compensating control. When accepting the current state of threats, vulnerabilities and
designing and implementing a control, the goal should be to control environment. The organization has the opportunity to
ensure the CIA of the information resources. To ensure control mitigate the risk through the application of additional controls.
effectiveness and sustainability it must be part of the overall Once these controls are applied, the risk remaining is the
governance process. Control design, monitoring and testing residual risk. The organization should implement controls
is key to this process including ownership. The ISACA white until the residual risk is at an acceptable level and management
paper Internal Control Using COBIT 5 provides specific details is willing to formally accept the risk. There is risk in everything
on this process.7 Also, the control frameworks such as COBIT and the sweet spot is finding a level of risk that enables a
5 for Security, ISO/IEC 27001, NIST Cybersecurity Framework benefit commensurate with the cost. For example, implementing
(and NIST SP 800-53 controls mentioned previously) provide controls such as virtual private networks (VPNs) and
excellent controls to choose from at the governance and two-factor authentication mitigates the risk of man-in-the-
detailed control levels. These can be supplemented by more middle or eavesdropping attacks (threat) to an acceptable
detailed vendor guidance. level for most organizations by removing the vulnerability
that would exist without the implemented control. For a highly
Determine Impact Severity secret government entity, this control may not be enough,
This step assumes that the vulnerability has been exploited and and restrictions to private networks and increased access
now the organization can evaluate and respond to the harm authorization may be a required control based on the CIA
that has been done. Finance can provide insight into the costs requirements of the information system and assets.
of a system outage, or experienced/external sources on data
breaches can be leveraged to determine if the cost would be Develop a Cyber Security Risk Response
high to the organization or regarded as a write-off. Impacts When risk rises to the level where attention is needed (e.g.,
may include unauthorized disclosure of information, destruction a high or medium risk, or a combination of multiple types of low
of data, loss of systems, loss of reputation, loss of market risk), management must decide which approach to take. The
share and the value of the asset compromised. Sometimes most obvious approach is to invest in people, technology or
the impact may not be readily known, such as in the case of a processes to mitigate the risk. However, this requires resources
stolen product list, marketing plans or design specifications for and money the organization may not have. The organization
a new product, until later when a competitor is increasing sales also may have uncovered many risk areas through this process
at the companys expense (leveraged customer lists or internal and needs to plan the mitigation on a prioritized basis over
pricing lists) or building an identical product at a lower cost several years as funds permit (most likely case).
(research and design costs unnecessary).
Alternatively, there are other options for resolving the risk.
While it is important to have corrective controls in The risk could be assumed or accepted as is if it fits within
place to respond to an exploited vulnerability, it is more the companys risk appetite. In other words, the company
important to ensure preventive controls are operating is willing to take the chance that the event will not occur,
effectively and efficiently to mitigate the probability possibly because the impact is low or the probability of threat
of an attack. An effective risk assessment will guide is insignificant. For example, an organization may not invest
management in determining the appropriate level of controls. in a new malware endpoint protection product that targets
However, it is management who is responsible to implement ransomware because it perceives the cost to be low (restore
preventive, detective and corrective safeguards depending on from backup tapes, workstation is on a segmented network)
multiple variables. or there are other threat prevention mechanisms in place, such
as end-user phishing education awareness and email scanning

7 ISACA, Internal Control Using COBIT 5, USA, 2016, www.isaca.org/internal-control

2017 ISACA. All rights reserved.


Auditing Cyber Security: Evaluating Risk and Auditing Controls 8

technology to rewrite and test for malicious links. In cases Internal Audit
where the risk is accepted, an effective method is to have the The importance of having defined processes, trained and
risk accepted by someone at the senior management level, competent cyber security resources, and a governance
supported by a business justification, plans for future mitigation framework to ensure that appropriate actions are carried out by
and a signature. the senior leadership and managed effectively on a daily basis
to address current and emerging threats cannot be overstated.
The organization may decide to avoid the risk by
While those being audited may at times view it as a business
decommissioning the server with an unsupported operating
disruption to gather evidence and participate fully in the audit,
system no longer receiving patches. It may decide to limit the
this external view is critical to ensure that the program is
risk by adding other detective or preventive controls to mitigate
meeting the business objectives. The process builds additional
the risk. It may add into its processes alarms in the network
accountability in the organization being audited and makes the
logging products to alert when data exfiltration appears to be
control environment stronger.
occurring on the device.
The internal audit department usually has a dotted-line
Cyberinsurance is another way to mitigate the risk through
reporting relationship to the audit committee to ensure that an
transference to another entity. While this will not mitigate the
independent view is being communicated to the board level
risk or transfer the ultimate accountability, it can reduce the
of the enterprise. Historically, these discussions have been on
financial impact of the event if it does occur.
the financial, operational and information system audit areas;
To ensure adequate funding, cyber security remediation however, cyber security is increasingly receiving the attention
plans typically need to be executed over a period of time. of the board, and the internal audit department is playing a
Organizations should expect that certain types of reviews, vital role. The internal audit function provides internal controls
such as critical vulnerabilities, must be addressed within seven, testing, cyber security compliance, formal risk acceptance, and
30 or 90 days, depending upon the asset and the organization. support for investigations and forensics.
These instances need to be reviewed by the auditors to
Cyber security audits should be planned on an annual
ensure that the vulnerabilities are being addressed within the
cycle, taking into account consideration of the
time frames; if not, changes to the processes or expectations
business cycles, to cause minimal disruption to
to appropriately address the threat must be identified.
business activities and increase the chances of full
Frameworks such as COBIT 5 for Information Security,
participation of the information technology (IT), legal,
ISO/IEC 27001 and the NIST Cybersecurity Framework are
human resources (HR) and business areas necessary
tools to promote governance of cyber security risk to ensure
for the audit. With appropriate planning and time for the
it is mitigated to an acceptable level.
departments to gather the evidence (at least three or four
weeks should be provided ahead of the audit), the audit can
Emerging Risk be focused on discovering the problem areas and evaluating
Ten years ago, most organizations were not addressing mobile, the risk vs. waiting for and repeatedly requesting the information
cloud and social media. It has only been in the past ten years multiple times. Audits should be planned activities with entrance,
that an explosion in these platforms has been experienced, daily update and exit meetings, and exact expectations for each
and now it seems almost everyone has at least one social stage clearly communicated. Testing activities frequently require
media account and a phone in their pocket. The Internet account setup and access to carry out activities, and failure to
of Things (IOT) is causing changes in the products we buy. provide these in a timely manner can elongate the audit.
Threat intelligence is being shared through organizations.
Ransomware, targeted attacks, spear phishing, and
Audit Scope
increased adversary capabilities cause us to reevaluate
Organizations are rarely monolithic entities with all the
the threat environment and our defenses to it on a
information processing occurring within the company or fully
regular basis. The risk assessment is not a once and done
accessible to the auditors. Users may be using their home
vehicle. Cyber security incidents should be reviewed for new
networks while working from home, applications may be
scenarios of attack, and prevention, detection and response
executing in the cloud, or there may be private confidential
actions must be identified and brought into the risk assessment.

2017 ISACA. All rights reserved.


Auditing Cyber Security: Evaluating Risk and Auditing Controls 9

systems (e.g., HR information, legal documentation) that may information. This could be accomplished through a
need further access or authorization to enable an audit (see right-to-audit clause included in the contract, a security
figure 3). As data may flow across these systems and present standard certification (e.g., ISO/IEC 27001, SSAE 16 SOC2
risk, these restrictions should be recognized and addressed report, Cloud Security Alliance (CSA) Control Matrix report8),
so that the audit coverage is clear in scope. Users may need and contractual liability for information entrusted to their care.
to sign work-at-home agreements permitting the audit of their Vendors will attempt to limit their liability; however, they should
environment, or the use of mobile devices may need to be be willing to provide one of these assurances as they are
supported by a document signed by the user that information being depended upon to protect the information and represent
about and configuration of the device are subject to audit. an extension to the enterprise. When a breach occurs,
the reputation damage is most likely to be targeted at the
Vendors handling informationparticularly information that organization entrusted with the data by the client or customer,
has high sensitivity or where personal data are involved not the downstream vendor processing the data.
should be required to demonstrate how they are protecting the

FIGURE 3AUDIT BOUNDARIES

Unrestricted Audit Scope Audit Restrictions Apply

Organizational Data
Networks Public Networks
Da

ta
Da
ta

Home Networks

SOURCE: ISACA, Transforming Cybersecurity, USA, 2013, figure 46

8 ISACA, COBIT 5 for Information Security, USA, 2012, www.isaca.org/COBIT/Pages/info-sec.aspx

2017 ISACA. All rights reserved.


Auditing Cyber Security: Evaluating Risk and Auditing Controls 10

Because cyber security audits are usually more technical and current and emerging risk is being identified and addressed.
complex than general audits, different approaches may be With the attention shifting today to detection and response, the
taken to facilitate the audit, depending upon the governance, organization may wish to audit to determine how well prepared
risk, management or assurance area of review (see figure 4). it is in the event of a breach.

Because it would be impossible to audit all areas of the


Cyber Security Goals and Related Audit Objectives business, it is essential to look at the high-value areas to audit.
Audits can take many shapes and have different focuses
For example, what would happen if the telecommunications
with respect to cyber security overall governance or technical
link between a call center and the necessary systems were
testing. Different aspects of the program should be tested over
to fail? Are appropriate controls in place to handle a denial-
time. For programs that may be in the initial states of maturity,
of-service attack for an e-commerce-oriented website? Does
the focus may be centered on ensuring that the policies,
the organization have the appropriate monitoring controls in
procedures, standards and guidelines are relevant, approved
place to ensure that data exfiltration activities would be noticed
by management, and frequently updated and reviewed in
in time, or have the data environments been segregated to
response to business changes. For more mature programs that
protect these data from a targeted attack?
have the basics in place, the audit may shift to examine how

FIGURE 4PLANNING AND SCOPING

Area/Type of Review Approach Remarks

The policy update supports transformation. The audit


Governance: cyber security will address the business function/local design and
Point in time, postimplementation after
policy and related technical key implementation of key operating procedures supporting
2013 due date for updated policy
operating procedures the policy. A follow-up audit on deficiencies will be
held in 2014.

The audit will address risk register accuracy,


Risk: risk register update, treatment Point in time for 2013 year-end,
completeness and proper updating. Risk reporting
and risk reporting in cyber security including 2012 risk audit results
(timeliness, completeness, accuracy) is included.

This is a semiformal review of any attack or


Management: cyber security Continuous, based on actual
breach (including near misses) as part of standard
incident reviews attacks, breaches and incidents
third-line-of-defense involvement.

Audit will independently review the efficiency


Point in time and transformational,
Assurance: cyber security risk and effectiveness of the cyber security risk
comparing 2012 against 2013
management process management process, i.e., the third line auditing
year-end
the second line of defense.

SOURCE: ISACA, Transforming Cybersecurity, USA, 2013, figure 48

2017 ISACA. All rights reserved.


Auditing Cyber Security: Evaluating Risk and Auditing Controls 11

The audit objectives should be aligned with the cyber security External Audit
goals to achieve the best business outcomes (see figure Organizations contract for the services of external auditors to
5). Matching the cyber security program goals with the audit provide independent assurance of the financial and operational
objectives will increase support for the audit within the cyber controls primarily to ensure the controls design is effective and
security management and vice versa. the implementation of the controls is operating as it should.
Outside auditors are also used by external entities to ensure

FIGURE 5CYBER SECURITY GOALS AND RELATED AUDIT OBJECTIVES

Cyber Security Goal Audit Objective(s) Remarks

Verify that documentation is complete and


up to date This audit addresses the universe of documents
Confirm that formal approval, release and (governance side) and controls stipulated by these
Cyber security policies, enforcement are in place. documents. Effective in this sense cannot audit more
standards and procedures are Verify that documentation covers all cyber than the proper approval/release/enforcement cycle,
adequate and effective. security requirements. whereas adequate can relate only to completeness,
Verify that subsidiary controls cover all adequacy and integrity of the policies, standards
provisions made in policies, standards and procedures.
and procedures.

Confirm the reliability of the risk


identification process. This audit will usually span several years, focusing
Emerging risk is reliably Assess the risk evaluation process, including on processes, tools and methods in the first year. In
identified, appropriately tools, methods and techniques used. subsequent years, auditors will most likely take
evaluated and adequately Confirm that all risk is treated in line with the samples of risk areas and drill down into the process.
treated. evaluation of the results. The audit may include external data to qualify the
Verify that the treatment is adequate or formal full coverage of emerging risk.
risk acceptances exist for untreated risk

Verify the existence and completeness of the


transformation process and related guidance.
Verify that the transformation process is
Cyber security transformation This audit, which will transpire over several
implemented and followed by all parts of
processes are defined, deployed years, is designed to cover the processes for
the enterprise.
and measured. transforming cyber security.
Confirm controls, metrics and
measurements relating to transformation
goals, risk and performance.

Confirm monitoring and specific technical


This is an in-depth technical audit that looks at the
attack recognition solutions.
technology for early recognition and identification of
Attacks and breaches are Assess interfaces to security incident
attack, then at the subsequent steps for escalating
identified and treated in a timely management and crisis management processes
and managing incidents. Timely and appropriate
and appropriate manner. and plans.
are defined as specified in relevant policies, standards
Evaluate (on the basis of past attacks) the
and procedures (no subjective audit judgment).
timeliness and adequacy of attack response.

SOURCE: ISACA, Transforming Cybersecurity, USA, 2013, figure 47

2017 ISACA. All rights reserved.


Auditing Cyber Security: Evaluating Risk and Auditing Controls 12

that the services of the organization are meeting needs. These Cyber security maturity tools are typically used by
audits are typically on behalf of a governmental agency or those responsible for managing the cyber security
regulator. Auditing cyber security controls can leverage the program to demonstrate year-over-year enhancement
expertise of an external auditor and retain access to skill sets of the program. Multiyear road maps can then be generated,
that may not be present within the organization. The technical suggesting new tools and approaches to increase the maturity
skills required for specialized analysis, such as penetration level. These can drive RFP processes to engage vendors
testing, examining the server or firewall configurations, to attain the best pricing and product fit in a systematic
or reviewing the security information event management manner vs. responding to the latest threat. This also permits
(SIEM) rule sets, may not currently exist in the internal audit implementation of controls through planned mechanisms at
department and could leverage external skill capabilities. a lower cost, as the project can be spread out over a longer
period without needing to hire an expensive resource because
Cyber Security Maturity Models the project needs to be completed immediately. This also
A cyber security program maturity model could also be permits relationships to be built among the business area,
implemented to analyze the current state, with a view toward the vendor, project manager and allocated technical resource to
desired state as other cyber security controls are assessed and help guide the effort.
new technology, people or process controls are implemented.
Prior management reviews, risk assessments and audit findings
Different organizations and frameworks have various names for
can be leveraged to build the maturity model to provide a holistic
the increasing levels of maturity; however, most adhere to some
picture of the cyber security program maturity state and identify
form of the following to demonstrate maturity: nonexistent
areas that will fill gaps in the risk assessment and decrease the
(level 0), ad hoc (level 1), repeatable (level 2), defined (level 3),
likelihood of a subsequent internal or external audit findings.
managed (level 4) and optimized (level 5).

At the nonexistent and ad hoc ends of the scale, cyber security


is not a planned activity and may not have the executive CORRECTIVE
ACTION PLANS
awareness needed to move the program forward. Policies may
be nonexistent or controls may be in place and not driven by
policy or consistently applied. Tools may not exist or, when Reviews created through management, risk management
they do exist, are poorly executed. Obviously, this is not a processes or internal audit will identify gap or issue items
state where organizations need to stay, but it is a state where needing resolution. Once these cyber security gaps are
many programs start out prior to the assignment of someone known and agreed to via the draft reports, actions need to
specifically responsible for cyber security and the broader be formulated within a reasonable time frame (10 to 30 days,
information security program (e.g., chief information security depending on the organization) and corrective action plans
officer [CISO], vice president of information security, director of agreed to by the business owners. The organization needs to
information security). monitor these agreed-upon activities, milestones and deliverable
dates to ensure that the security posture is not weakened
At the top end of the maturity scale, cyber security is an
through inattention to the gap areas. Process (or business)
important part of the culture, executive scorecards report
owners should agree on the time frame for ongoing processes,
the metrics tied to the financial and operational company
such as 90 days for remediation of new vulnerabilities identified
performance, and industry frameworks are adopted to drive
or reporting of all incidents within 24 to 72 hours.
continuous improvement in the cyber security program.
Reporting is also at a high enough level in the organization to
obtain the necessary attention and funding.

2017 ISACA. All rights reserved.


Auditing Cyber Security: Evaluating Risk and Auditing Controls 13

SUMMARY
Failure to protect the information assets of an organization can
have a devastating impact on business operations, financial
condition and reputation in the marketplace. Appropriate
investment in cyber security controls is necessary to reduce
the attractiveness of the target for the attacker and increase
the expense of the attack. Multiple frameworks such as
COBIT 5 for Information Security, ISO/IEC 27001 and the NIST
Cybersecurity Framework, along with the NIST SP 800-53
controls, provide processes that may combine to enable
management of cyber security controls.

Equally important are the multilayered review defenses of


management, risk management and internal audit to ensure
that cyber security controls are well designed to protect the
information assets and are operating effectively. Without these
review processes, the organization sacrifices governance
of the cyber security controls, as reliance of the control
operating effectively depends on one area of failurethe
department operating the control. The management reviews,
risk management processes, internal audits and the business
operations responsible for executing the cyber security controls
are complementary to each other. Auditing the cyber security
controls provides insight for improvement opportunities and
should be embraced by the organization to enhance the
maturity of the cyber security program.

2017 ISACA. All rights reserved.


Auditing Cyber Security: Evaluating Risk and Auditing Controls 14

3701 Algonquin Road, Suite 1010


Rolling Meadows, IL 60008 USA
ISACA
Phone: +1.847.253.1545
ISACA (isaca.org) helps global professionals lead, adapt and assure trust in an evolving
Fax: +1.847.253.1443 digital world by offering innovative and world-class knowledge, standards, networking,
Email: info@isaca.org credentialing and career development. Established in 1969, ISACA is a global nonprofit
Web site: www.isaca.org association of 140,000 professionals in 180 countries. ISACA also offers the Cybersecurity
Nexus (CSX), a holistic cybersecurity resource, and COBIT, a business framework to
Provide feedback: govern enterprise technology.
www.isaca.org/auditing-cyber-security

Participate in the ISACA


Knowledge Center:
Disclaimer
www.isaca.org/knowledge-center This is an educational resource and is not inclusive of all information that may be needed to assure a successful outcome.
Readers should apply their own professional judgment to their specific circumstances.
Follow ISACA on Twitter:
https://twitter.com/ISACANews
Reservation of Rights
Join ISACA on LinkedIn:
ISACA (Official), 2017 ISACA. All rights reserved.
http://linkd.in/ISACAOfficial

Like ISACA on Facebook:


www.facebook.com/ISACAHQ

2017 ISACA. All rights reserved.


Auditing Cyber Security: Evaluating Risk and Auditing Controls 15

ACKNOWLEDGMENTS
ISACA wishes to recognize:

Author Andre Pitkowski


Todd J. Fitzgerald CGEIT, CRISC, OCTAVE, CRMA, ISO27kLA, ISO31kLA,
APIT Consultoria de Informatica Ltd., Brazil, Director
CISA, CISM, CRISC, CGEIT, Grant Thornton
International, Ltd, USA Eddie Schwartz
CISA, CISM, CISSP-ISSEP, PMP, USA, Director
Expert Reviewers
Jo Stewart-Rattray
Ian Cooke CISA, CISM, CGEIT, CRISC, FACS CP, BRM Holdich,
CISA, CRISC, CGEIT, CFE, CPTS, DipFM, ITIL Australia, Director
Foundation, Six Sigma Green Belt, An Post, Ireland
Tichaona Zororo
Khaja Khan CISA, CISM, CGEIT, CRISC, CIA, CRMA, EGIT | Enterprise
Ace Hardware Corporation, USA Governance (Pty) Ltd., South Africa, Director

John McGill Zubin Chagpar


CISA, R&M Consulting, USA CISA, CISM, PMP, Amazon Web Services, UK, Director

Rajaramiyer Venketaramani Raghu


Board of Directors CISA, CRISC, Versatilist Consulting India Pvt. Ltd.,
Christos K. Dimitriadis India, Director
Ph.D., CISA, CISM, CRISC, INTRALOT S.A.,
Jeff Spivey
Greece, Chair
CRISC, CPP, Security Risk Management, Inc., USA, Director
Theresa Grafenstine
Robert E Stroud
CISA, CGEIT, CRISC, CIA, CGAP, CGMA, CPA,
CGEIT, CRISC, Forrester Research, USA, Past Chair
U.S. House of Representatives, USA, Vice-chair
Tony Hayes
Robert Clyde
CGEIT, AFCHSE, CHE, FACS, FCPA, FIIA, Queensland
CISM, Clyde Consulting LLC, USA, Director
Government, Australia, Past Chair
Leonard Ong
Greg Grocholski
CISA, CISM, CGEIT, CRISC, CPP, CFE, PMP, CIPM,
CISA, SABIC, Saudi Arabia, Past Chair
CIPT, CISSP ISSMP-ISSAP, CSSLP, CITBCM, GCIA,
GCIH, GSNA, GCFA, Merck, Singapore, Director Matt Loeb
CGEIT, FASAE, CAE, ISACA, USA, Director

2017 ISACA. All rights reserved.

Você também pode gostar